Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
meta data
biblio
Ontology literature review as guidelines for improving Croatian Qualification Framework
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
interoperability
Resiliency
Qualifications
public web
pubcrawl
open systems
ontology literature review
Ontology
ontologies (artificial intelligence)
ontological structures
mutual relations
meta data
labour market
composability
Information systems
grid service architecture
expandability
educational systems
educational administrative data processing
education-related ontologies
education
E-Learning
CROQF
Croatian qualification framework
computer-interpretable data
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
Linux
Servers
Scalability
Resiliency
pubcrawl
peer-to-peer solutions
Peer-to-peer computing
Monte Carlo methods
Mobile handsets
mobile computing
mobile cloud computing
middleware
Metadata Discovery Problem
metadata
meta data
android
image file
File discovery service
distributed mobile-cloud apps
Distributed databases
Decision trees
Decision Tree
context-aware file discovery system
context-aware file discovery service
Computation offloading
composability
cloud-based metadata server
Cloud Computing
CAFDS
Android (operating system)
biblio
Using a Robust Metadata Management System to Accelerate Scientific Discovery at Extreme Scales
Submitted by aekwall on Wed, 09/04/2019 - 11:16am
-EMPRESS
Metadata Discovery Problem
software fault tolerance
scientific discovery
scale-up scientific applications
query functionality
Production systems
metadata management system
Fault tolerant systems
EMPRESS 2.0
EMPRESS 1.0
custom-metadata
atomic operations
Acceleration
-SIRIUS
Scalability
-descriptive-metadata
-Decaf
-data-tagging
-ATDM
storage management
meta data
fault tolerance
Analytical models
metadata
query processing
Computational modeling
composability
pubcrawl
Resiliency
biblio
Focal Visual-Text Attention for Visual Question Answering
Submitted by aekwall on Wed, 09/04/2019 - 11:15am
neural nets
Metadata Discovery Problem
visual text sequence information
text metadata
single-image visual question answering
question answering (information retrieval)
Neural networks
Scalability
Resiliency
pubcrawl
composability
Computational modeling
Knowledge Discovery
text analysis
Correlation
meta data
cognition
visualization
computer vision
Videos
collective reasoning
Focal Visual-Text Attention network
FVTA
inference mechanisms
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers
Submitted by grigby1 on Wed, 03/06/2019 - 4:27pm
cloud storage service
users space
store big data
storage management
single cloud storage
Servers
pubcrawl
multiple cloud storage provider
multiple cloud providers
metadata
meta data
local storage
insider attack
data privacy
data owner
Cryptography
Intelligent Data and Security
cloud service
Cloud Security
Cloud Computing
bit data center
big data privacy
big data file
Big Data
authorisation
asymmetric security concept
asymmetric secure storage scheme
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
Submitted by grigby1 on Fri, 02/22/2019 - 4:11pm
malware
static code analysis
static analysis frameworks
static analysis
Semantics
semantic features
Resiliency
pubcrawl
program diagnostics
obfuscation techniques
obfuscation
meta data
manifest-based features
malware detection
android
malicious applications
invasive software
Human behavior
Hardware
feature extraction
Cryptography
composability
commercial antiviruses
code-based features
application metadata-based features
android malware static analysis
Android (operating system)
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication
« first
‹ previous
1
2
3
next ›
last »